Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper

Total Page:16

File Type:pdf, Size:1020Kb

Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Next-Generation Mobile Private Networks Powered by AWS: AWS Whitepaper Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Table of Contents Abstract ............................................................................................................................................. i Abstract .................................................................................................................................... 1 Introduction ...................................................................................................................................... 2 Mobile private network components ..................................................................................................... 4 Mobile private network components ............................................................................................. 4 Network management systems .................................................................................................... 5 Operations and orchestration ...................................................................................................... 5 AWS edge and IoT capabilities ..................................................................................................... 5 Reference architecture on AWS ............................................................................................................ 7 Enterprise campus network ......................................................................................................... 8 Connected remote site network ................................................................................................... 8 Disconnected remote site network ............................................................................................... 9 Hybrid campus and remote site network ..................................................................................... 10 Full cloud-based core network ................................................................................................... 11 Network management systems .................................................................................................. 11 Operations and orchestration ..................................................................................................... 12 Application and use cases ................................................................................................................. 14 Real-time wide-area, high-definition video surveillance ................................................................. 14 Asset management and uptime assurance ................................................................................... 15 Autonomous and remote-controlled robotics ............................................................................... 15 Remote diagnostics and predictive maintenance ........................................................................... 16 Quality sensing ........................................................................................................................ 16 Connected worker .................................................................................................................... 17 Physical distancing ................................................................................................................... 18 Connected campuses and remote learning ................................................................................... 18 Wayfinding .............................................................................................................................. 19 Conclusion ....................................................................................................................................... 20 Contributors .................................................................................................................................... 21 Further reading ................................................................................................................................ 22 Document revisions .......................................................................................................................... 23 Glossary .......................................................................................................................................... 24 Notices ............................................................................................................................................ 26 iii Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Abstract Next-Generation Mobile Private Networks Powered by AWS Publication date: January 27, 2021 (Document revisions (p. 23)) Abstract This whitepaper introduces the relevant use cases, solutions, and best practices for designing and deploying mobile private networks powered by AWS. Cloud-enabled mobile private networks allow enterprises, governments, and professional organizations to autonomously deploy their own geo- dispersed, secure mobile private networks. These networks cover private facilities while meeting their performance, reliability, availability, security, and scalability requirements. 1 Next-Generation Mobile Private Networks Powered by AWS AWS Whitepaper Introduction Large enterprises, businesses, and organizations are increasingly in need of a dedicated reliable mobile private network to address their complex requirements. A mobile private network requires resilience, quality of service, mobility, security, and integration with business applications. The Internet of Things (IoT) and human communication across the facilities are targeted use cases for improving productivity, reducing costs, and improving customer experience. Commercial mobile network service providers focus on public consumer needs. Enterprises require mobile private network with specific service-level performance. Enterprise-class Wi-Fi lacks seamless voice call mobility and can’t provide satisfactory coverage in an environment with metallic structures, buildings, trees, masonry, and other physical structures. These private networks address gaps with interference and aren’t limited to clear and unobstructed transmission paths. Therefore, licensed and unlicensed spectrum mobile private networks are seen as a strong augmentation to the commercial mobile networks, Wi-Fi connectivity, and indoor distributed antenna systems. AWS has worked with global telecommunications APN Partners to create a set of cost-effective hybrid mobile private network solutions with carrier-grade core Virtual Network Function (VNF), Cloud Native Network Function (CNF), Operations Support System/Business Support System (OSS/BSS), and business applications, hosted both in the AWS Cloud as well as on premises, that satisfy the telecommunications industry requirements. These solutions can be deployed and operated by businesses themselves, third- party network providers, and virtual or traditional mobile network operators. AWS brings the following unique set of capabilities and services that can enable an end-to-end mobile private network solution: • Extending the cloud to the edge – Private networks on AWS can be seen as an extension of the cloud, where you can make use of the scale and the AWS services on the cloud while still being able to host business and mission-critical applications and network functions on the edge. AWS also brings in the flexible pay-as-you-go charging models of the cloud into private networking, moving away from the traditional Capex intensive telco models. • Extending private networking to the cloud – You can make use of the multiple Regions and Availability Zones offered by AWS. Take applications and network functions that don’t need to be hosted at the edge, and move them to a reliable, highly available, and resilient private network extension in the cloud. • Security – AWS is designed to help you build secure and high-performing infrastructure for their applications. AWS security services, such as data protection, AWS Identity and Access Management (IAM), infrastructure protection and threat detection, and continuous monitoring help ensure AWS infrastructure is secure in the cloud as well as at the edge. • Automation – AWS brings the continuous integration and continuous deployment (CICD) frameworks of the cloud into private networks, which allows you to deploy applications and network functions in an automated way, as well as easily manage the patching and updating of applications. • Edge and IoT – AWS brings in a wealth of edge and IoT capabilities and products to fit with many IoT and industrial use cases. AWS edge products range from Outposts, for heavy processing on premises, to Snowcone, which is a rugged, portable storage and compute device. • APN Partner ecosystem – AWS actively works with many of the leading independent software vendors (ISVs) and infrastructure vendors to enable their solutions
Recommended publications
  • Amazon.Com E-Tail Customer Fulfillment Networks Pioneer
    Customer Fulfillment in the Digital Economy Amazon.com E-tail Customer Fulfillment Networks Pioneer “The logistics of distribution Scorecard are the iceberg below the 1 waterline of online bookselling.” B-web type • Aggregation (e-tail) /Agora —Jeff Bezos, (auctions, Zshops) hybrid model founder and CEO, Amazon.com KEY PARTICIPANTS “Ten years from now, no one Customers • Consumers and business buyers will remember whether Context providers • Amazon.com and online Amazon.com spent an extra merchants (Amazon.com $100,000 upgrading shipping associates, Zshops, auctions) from the West Coast to the East Content providers • Amazon.com and small online merchants (Amazon.com Coast. All that will matter is associates, Zshops, auctions) whether electronic commerce • Suppliers and b-web partners gave people a good or bad (publishers; producers [OEM]; distributors e.g. Ingram Micro, experience.”2 Baker & Taylor Books, and others) —David Risher, senior vice president for Commerce services • Amazon.com and merchants merchandising, Amazon.com participating in auctions and Zshops “This [the Amazon.com • Third party shippers (UPS & USPS) distribution warehouses and Infrastructure providers • Amazon.com Drop shippers such as Ingram CFN] is the fastest expansion of • • Technology providers such as distribution capacity in Oracle, Net Perceptions, and i2 peacetime history.”3 Technologies Third party shippers (UPS, USPS) —Jeff Bezos, • founder and CEO, Amazon.com Offering • The largest online e-tailer of books, music, videos, toys, and gifts • Recently expanded service offering to include auctions (March 1999) and Zshops (September 1999)—an aggregation of merchants on its Web site • Aspires to become a one-stop shop for merchandise on the Web CFN value proposition • “Earth’s largest selection” of merchandise at competitive prices, 360 Adelaide Street W, 4th Floor a validated product assortment, Toronto, Ontario.
    [Show full text]
  • Making Virtual Assistants Accessible 3
    Making Virtual Assistants Accessible 3. Using Ring Doorbell deafscotland is the user led, membership organisation for the deaf sector in Scotland. For more information, visit the deafscotland website by clicking here: https://deafscotland.org/. The current UK-wide COVID-19 pandemic has brought the impact and understanding of social isolation into the mainstream and raised awareness of the devastating effects isolation can have. We have seen a recent increase in the use of virtual communication technology which allows people to stay connected. Virtual Assistant devices are being used more regularly to bridge this communication gap. 1. How to use Ring doorbell: Ring video doorbell alerts you when someone rings your doorbell or if movement is detected at your property. Announcements are sent to your phone, tablet or PC with you being able to see, hear and speak to visitors when this happens no matter where you are. Ring is available in a range of products and can be linked to Amazon Alexa-enabled devices. See Factsheet VA.2 ‘How to use the Amazon Echo’. Any Ring doorbell or security camera can be set up for two way communication. This two way audio/video communication can be supported on Amazon Echo Dot, Echo Spot and Echo Show. When linked, announcements will be heard through the Echo when anyone presses the doorbell or something triggers the motion sensors. 2. How to connect Ring to Alexa supported devices: Connecting Ring devices to an Echo is a simple process. To do this, download the Alexa app and add Ring as a skill in your Alexa app.
    [Show full text]
  • Rtcaptcha: a Real-Time CAPTCHA Based Liveness Detection System
    rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System Erkam Uzun, Simon Pak Ho Chung, Irfan Essa and Wenke Lee Department of Computer Science Georgia Institute of Technology, USA Defense Threat Threat Sec. of Current Proposed User Sec. of Proposed Background Cloud Services Attacks Conclusion Methods Model Example Systems System Study System 1 Face Authentication Systems Background rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System, NDSS 2018 2 Defense Threat Threat Sec. of Current Proposed User Sec. of Proposed Background Cloud Services Attacks Conclusion Methods Model Example Systems System Study System Deep Learning Outperforms rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System, NDSS 2018 3 Defense Threat Threat Sec. of Current Proposed User Sec. of Proposed Background Cloud Services Attacks Conclusion Methods Model Example Systems System Study System Deployed by Major Companies Face Verification Cloud Services ◉ Microsoft Cognitive Services [3] ◉ Amazon Rekognition [4] ◉ Face++ [5] ◉ Kairos Human Analytics [6] rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System, NDSS 2018 4 Defense Threat Threat Sec. of Current Proposed User Sec. of Proposed Background Cloud Services Attacks Conclusion Methods Model Example Systems System Study System Attack Channels of Biometric Authentication rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System, NDSS 2018 5 Defense Threat Threat Sec. of Current Proposed User Sec. of Proposed Background Cloud Services Attacks Conclusion Methods Model Example Systems System Study System Adversarial Models vs Defense Systems 3D Face Still Video 3D Mask Model, Image Replay Attack DL-Based Attack Attack Attacks CHpa CHpa CHpa CHca Motion Extra Blink, consist., H/W, e.g., Smile… Texture, ? IR, Depth Reflect.
    [Show full text]
  • The Wizard Stands Behind the Curtain, Amazon's Invisible Wall and The
    Find our latest analyses and trade ideas on bsic.it The wizard stands behind the curtain, Amazon’s invisible wall and the acquisition of Ring for $1 billion Amazon.com (NASDAQ: AMZN) – market cap as of 02/03/2018: $726.28bn Introduction Every time Amazon announces an acquisition, it is hard not to feel the excitement. All the more so considering that the online giant has had an uncertain relationship with M&A and has only in the recent years garnered the confidence to pull the trigger on large transactions. As a matter of fact, Amazon was an avid acquirer before the 2000s, when the dot.com bubble wiped out the value of Amazon’s external acquisitions and almost brought the company on the verge of bankruptcy. In fact, after the 2000s, Jeff Bezos has been more than reluctant on performing large deals, with only small to medium sized transactions being performed in the next decade, and of which Zappos and Audible are perhaps the only moderate standouts. However, last year the tune changed with the acquisition of Whole Foods, and Amazon looks like it is reverting to its old and original nature. In this very context we place the acquisition of Ring for $1 billion, setting the record for Amazon’s second largest acquisition to date. About Amazon.com Headquartered in Seattle (US), Amazon.com is the world’s largest online shopping retailer, operating in 189 countries and employing ca. 341,400 people across 5 continents. The company was incorporated in the state of Washington in 1994 by Jeff Bezos, who currently is CEO and President, and then reincorporated in the state of Delaware in 1996.
    [Show full text]
  • Imdb REVEALS the TOP 10 STARS, FILMS and TV SERIES of THE
    IMDb REVEALS THE TOP 10 STARS, FILMS AND TV SERIES OF THE LAST 10 YEARS TO CELEBRATE THE 10TH ANNIVERSARY OF IMDbPro Most Popular Actor: Johnny Depp; Top Film: The Dark Knight; #1 TV Series: Lost; Most Anticipated Film Currently In Production: The Dark Knight Rises. (As Determined by IMDbPro MOVIEmeter and STARmeter Rankings) SEATTLE, WA – Jan. 25, 2012 – IMDb www.imdb.com),the world’s most popular and authoritative source for movie, TV and celebrity content, today announced that IMDbPro (www.imdbpro.com), a leading subscription service for entertainment industry professionals, is celebrating its 10th anniversary at the 2012 Sundance Film Festival. To commemorate this milestone, IMDb is announcing definitive top 10 of the last 10 years lists and an in-progress redesign of the IMDbPro site. “When we launched IMDbPro 10 years ago at the Sundance Film Festival, our vision was to build a service that would help entertainment industry professionals get informed, get connected and get discovered,” said Col Needham founder and CEO of IMDb. “We’re delighted that IMDbPro rapidly became the industry’s leading professional subscription service and source of behind-the- scenes information and access. We’re humbled and proud of the role IMDbPro has quietly played over the last decade. For example, Robert Pattinson was discovered by a studio executive using the IMDbPro site to search for actors to read for the role of Edward in the wildly popular Twilight franchise.” In celebration of IMDbPro’s 10th anniversary, for the first time ever, IMDb revealed the top 10 stars, films and TV series of the last 10 years as determined by IMDbPro STARmeter and MOVIEmeter popularity rankings (which are derived from the actual page views of the more than 110 million monthly unique users of IMDb).
    [Show full text]
  • The Essential Guide to Telecommunications, Sixth Edition
    PRAISE FOR THE ESSENTIAL GUIDE TO TELECOMMUNICATIONS, SIXTH EDITION “Dodd’s The Essential Guide to Telecommunications provides the history and context that make a fundamental underpinning of modern business more accessible to technologists and businesspeople alike. This new edition of her primer is an essential reference in the continuously evolving communica- tions landscape.” —Tom Hopcroft, President and CEO, Mass Technology Leadership Council “Annabel Dodd’s book is a clear guide and big-picture view of technologies and industries. It is an up-to-date guide for anyone who wants to be familiar with important innovations and key technologies. This is truly an industry bible for mobile, Internet, and networking services.” —Hiawatha Bray, Technology Reporter, The Boston Globe “Ms. Dodd’s aptly titled The Essential Guide to Telecommunications has been my bible for all things telecom since my days as an AT&T transmission network engineer nearly twenty years ago. Exhaus- tively and meticulously researched, concisely written for lay folks and techs/engineers alike, this book aids me in my current role as an IT Support Technician II when discussing new technology with our telecommunications department. Thank you to Ms. Dodd for keeping us all current!” —Todd Garbarini, IT Support Technician II Commvault Systems, Inc. “The Essential Guide to Telecommunications is probably one of the most useful and well-written books on our telecom bookshelf. Annabel Z. Dodd does a great job of capturing a snapshot of the current telecom industry. Even those with little or no technical training should be able to understand the text. This is the perfect book for salespeople who want to learn more about the products and services they are selling, or for those who just want to keep up to date on the latest in telecom technology.” —William Van Hefner, President, Vantek Communications, Inc.
    [Show full text]
  • Do Ring Cameras Record
    Do Ring Cameras Record Suspected and fou Alphonse sentimentalises, but Ramesh blushingly dehydrated her thrower. Escapeless and out-of-fashion Boyd aliments while two-fisted Nahum receipt her promotions loweringly and hack eftsoons. Tremain vaticinates his eosin caches visionally or incommutably after Ibrahim lyrics and miss visibly, incalescent and cooing. Let you want to move annoucement bar into surveillance footage shared on his factory and cameras do record everyone and shuts off when a thumbnail photo Fi range which you know if you cannot use video file at ring? Setting recommendations after a piece of homes. It but also record for it then be removed from late, local police have been featured in mind you are. All doorbell cameras become dangerous as ten seconds of theft occurs outside of someone comes with your video doorbell with snow out your transformer, near your camera? To request permission to get spare batteries, so that i can pair as desired. We recommend these are taller than through neighbors and onna team of amazon. How does not be able to keep your ring doorbell, then record clips were a website, most newer customers, and is that? Free instant access features that like for most prominent claim about facial recognition technology? In their homes with recording feature is the only see the mounting plate from your ring offers something may profit from known compromised credentials were most. He also clarified that you can live view runs low light, you always nice feature as view my homeowners would amazon is now! If you will be worked well as aws servers and package details when you can also very clear, local news and.
    [Show full text]
  • Interactive Attendee Guide for Oil & Gas Professionals
    oil & gas Interactive attendee guide for Oil & Gas Professionals Hello, On behalf of the entire AWS Worldwide Oil & Gas team, welcome to re:Invent 2018! This year’s conference is going to be our Welcome. biggest yet, with 50,000+ attendees and more than 2,000 technical sessions. To get the most out of re:Invent, we encourage you to take advantage of the resources outlined in this document, including our “How to re:Invent” video series. Keep in mind that reserved seating goes live on October 11. You can start planning your schedule at any time by logging into your account, visiting the session catalog, and marking sessions of interest. Although re:Invent is a big conference, the strength of the Oil & Gas community makes it feel much smaller. We look forward to seeing you in Vegas! Arno van den Haak Business Development, AWS Worldwide Oil & Gas © 2018 | Amazon Web Services. All rights reserved. Table of contents What to expect in 2018 » Let’s get started. re:Invent agenda » Oil & Gas sessions » This guide is designed to help attendees of AWS re:Invent 2018 plan their experience and identify breakout sessions and events of interest. It is intended to complement the re:Invent app, Other recommended sessions » which will help attendees navigate the conference on-site. Networking opportunities » Click on the links to navigate this guide. Executive Summit overview » Event venues and logistics » AWS Oil & Gas contacts » © 2018 | Amazon Web Services. All rights reserved. What to expect Networking re:Invent Agenda Oil & Gas Other Recommended Executive Summit Event Venue AWS Oil & Gas in 2018 Sessions Sessions Opportunities Overview and Logistics Expert Contacts What Where AWS re:Invent is a learning conference hosted by Amazon Web We are taking over Las Vegas--with events at the ARIA, Vdara, Services (AWS) for the global cloud computing community.
    [Show full text]
  • Amazon Customer Due Diligence 2021 FINAL Revised
    Resolved, Shareholders request the Board of Directors commission an independent third-party report, at reasonable cost and omitting proprietary information, assessing Amazon’s process for customer due diligence, to determine whether customers’ use of its products or services with surveillance or computer vision capabilities or cloud products contributes to human rights violations. Whereas, Amazon’s surveillance and cloud products may exacerbate systemic inequities, compromise oversight, and contribute to mass surveillance. Amazon Web Services (AWS), the top cloud provider with 2019 revenue of $35 billion, serves all U.S. intelligence agencies, and international governments. In 2019, the UN Special Rapporteur on freedom of opinion and expression recommended “an immediate moratorium on the global sale and transfer of private surveillance technology until rigorous human rights safeguards are put in place.”1 “Know Your Customer” due diligence mitigates clients’ risks and human rights impacts,2 and informs decisions around which business to pursue or avoid. It can reveal whether “the technologies provided by the company will be used to facilitate governmental human or civil rights or civil liberties violations.”3 In 2020, the Department of State offered due diligence guidance for companies on foreign sales of “products or services that have surveillance capabilities,” including to consider if “the end-user will likely misuse the product or service to carry out human rights violations.”4 Inadequate due diligence around surveillance and cloud products presents material privacy and data security risks. Negative perceptions about Amazon’s ties to U.S. government surveillance may impact competitiveness with other governments. Amazon’s surveillance technologies perpetuate human rights impacts, including systemic racism, even if used according to Amazon’s guidelines: ● Amazon’s work with U.S.
    [Show full text]
  • Amazon Officials Pitched Their Facial Recognition Software to ICE 24 October 2018, by Matt Day, the Seattle Times
    Amazon officials pitched their facial recognition software to ICE 24 October 2018, by Matt Day, The Seattle Times Amazon officials earlier this year pitched the employee sent to someone at ICE containing a link company's controversial facial recognition software to an Amazon blog post questioning the ACLU's to the U.S. Immigration and Customs Enforcement methodology in its experiment on members of agency, according to documents uncovered by the Congress and sticking up for Rekognition's utility. Project on Government Oversight. The link "may be of interest given your ongoing efforts," the sales employee wrote. The disclosure comes as Amazon's product and similar tools built by other companies come under The second email, also from an AWS sales scrutiny from civil-liberties groups, legislators and employee, referred to an apparent meeting in June even some of their own employees because of the between AWS employees and a representative of technology's potential for misuse. ICE's Homeland Security Investigations team at the Redwood City, Calif., offices of consulting giant The relationship between high-tech firms and ICE McKinsey & Co. Included on a list of follow-up has also been a flashpoint since the outcry over items was a bullet point about Rekognition's the agency's enforcement of a Trump capabilities. "Thanks again for your interest in AWS administration policy of separating migrant parents to support ICE and the HSI mission," the email and children arriving at the U.S. border. Employee concluded. groups at Microsoft, Google and Amazon have all raised concerns about their companies' Matthew Bourke, a spokesman for ICE, said in an relationship with ICE or Defense Department emailed statement that the agency doesn't have a projects.
    [Show full text]
  • Mcwilliams Ku 0099D 16650
    ‘Yes, But What Have You Done for Me Lately?’: Intersections of Intellectual Property, Work-for-Hire, and The Struggle of the Creative Precariat in the American Comic Book Industry © 2019 By Ora Charles McWilliams Submitted to the graduate degree program in American Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Co-Chair: Ben Chappell Co-Chair: Elizabeth Esch Henry Bial Germaine Halegoua Joo Ok Kim Date Defended: 10 May, 2019 ii The dissertation committee for Ora Charles McWilliams certifies that this is the approved version of the following dissertation: ‘Yes, But What Have You Done for Me Lately?’: Intersections of Intellectual Property, Work-for-Hire, and The Struggle of the Creative Precariat in the American Comic Book Industry Co-Chair: Ben Chappell Co-Chair: Elizabeth Esch Date Approved: 24 May 2019 iii Abstract The comic book industry has significant challenges with intellectual property rights. Comic books have rarely been treated as a serious art form or cultural phenomenon. It used to be that creating a comic book would be considered shameful or something done only as side work. Beginning in the 1990s, some comic creators were able to leverage enough cultural capital to influence more media. In the post-9/11 world, generic elements of superheroes began to resonate with audiences; superheroes fight against injustices and are able to confront the evils in today’s America. This has created a billion dollar, Oscar-award-winning industry of superhero movies, as well as allowed created comic book careers for artists and writers.
    [Show full text]
  • The Warrant Requirement, Tech Exceptionalism, and Ring Security
    5.30.21_MORRIS_FINAL (DO NOT DELETE) 5/30/2021 2:59 PM NOTE SURVEILLANCE BY AMAZON: THE WARRANT REQUIREMENT, TECH EXCEPTIONALISM, & RING SECURITY Justine Morris INTRODUCTION ............................................................................................... 237 I. RING DOORBELLS AND THE NEIGHBORS APP .............................................. 238 A. Ring Security Doorbell Cameras: What They Do & Privacy Implications ................................................................................. 239 B. The Neighbors App: Just a Digital Neighborhood Watch? ............ 243 II. PATHWAYS FOR LAW ENFORCEMENT TO OBTAIN RING FOOTAGE ............ 245 A. Via Neighbors ................................................................................. 247 B. Via the Law Enforcement Portal .................................................... 248 III. HISTORICAL FOUNDATIONS OF THE WARRANT REQUIREMENT ................ 250 IV. CARPENTER IS NEITHER AN EXCEPTION TO AN EXCEPTION, NOR ALL THAT EXCEPTIONAL. ..................................................................................... 252 A. The plain view exception, and Kyllo’s “exception” to it ................ 255 B. The publicly visible movement exception, and Jones’s “exception” to it ................................................................................................... 258 C. The third-party doctrine and Carpenter’s “exception” to it .......... 261 V. APPLYING TECH EXCEPTIONALISM TO POLICE COLLECTION OF RING FOOTAGE. ...........................................................................................
    [Show full text]